Developing countries are fast becoming players in an increasingly interconnected world. Many developing countries are making use of technological solutions to address unique challenges. However, in many cases, this growth is not accompanied with the development of appropriate information infrastructure protection structures. As technological solutions are deployed in developing countries, there will be a large number of new users gaining access to Internet-based systems. In many cases, these new users might lack the skills necessary to identify computer security threats. Inadequate cyber security measures can increase the risk and impact of cyber attacks. The development of internal structures to address Critical Information Infrastructure Protection (CIIP) is dependent on the environment in which it will be deployed. Therefore, traditional CIIP structures might not adequately address the technological challenges found in developing countries. In this chapter, the authors aim to address the development of CIIP structures in developing regions by elaborating on the set of unique challenges that exist. Furthermore, they aim to present a community-oriented structure aimed at providing CIIP, in what they refer to as a “bottom-up” manner. The larger aim of CIIP structures in developing regions is to support the future development and deployment of cyber security mechanisms and to allow developing countries to play a trusted role in global cyber security efforts. DOI: 10.4018/978-1-4666-2659-1.ch010
[1]
Nevil Brownlee,et al.
Expectations for Computer Security Incident Response
,
1998,
RFC.
[2]
Robin M. Ruefle,et al.
Handbook for Computer Security Incident Response Teams (CSIRTs)
,
2003
.
[3]
Joan Hash,et al.
Building an Information Technology Security Awareness and Training Program
,
2003
.
[4]
Joshua E. Kastenberg,et al.
Georgia’s Cyber Left Hook
,
2008,
The US Army War College Quarterly: Parameters.
[5]
Sebastiaan H. von Solms,et al.
C-SAW: Critical Information Infrastructure Protection through Simplification
,
2010,
HCC.
[6]
Ian Ellefsen,et al.
The Community-oriented Computer Security, Advisory and Warning Team
,
2010,
2010 IST-Africa.
[7]
Sebastiaan H. von Solms,et al.
Critical Information Infrastructure Protection in the Developing World
,
2010,
Critical Infrastructure Protection.
[8]
Jennifer L. Branch,et al.
“I Love Being Able to Have my Colleagues around the World at my Fingertips:”: Connecting Teacher-Librarians in the 21st Century
,
2013
.
[9]
Mingui Sun,et al.
Practising Language Interaction via Social Networking Sites: the "expert student's" perspective on personalized language learning
,
2013
.
[10]
Roderick P. Hart,et al.
Communication and Language Analysis in the Public Sphere
,
2014
.
[11]
R. Crew,et al.
Gubernatorial Rhetoric and Public Responsiveness
,
2014
.